Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2008 Issue 29
The Developments and Defence Trojan-horse Technology
zhang qiu-na (minxi vacational and technical college; the computer department; longyan 364000; china)
..............page:347-349,352
Using JSP Based in the Sort of the Middle Value of the Base of the Tree Structure of the BBS
yuan an-cui; wang gong-qiang (rizhao polytechnic; rizhao 276826; china)
..............page:409-410
JAVA Object Persistence Technology Based on Hibernate
su hua-jun (college of computer science and technology; anhui university of science & technology; huainan 232001; china)
..............page:394-396
An Improved Peer Selection Algorithm Based on the BitTorrent
liu zhi-dan1; wang guo-an2; ma shi-ling1 (1.department of computer science; henan university; kaifeng 475004; china; 2.network center; henan university; kaifeng 475001; china)
..............page:389-390,393
Blind Watermarking Algorithm Based on DCT Transform
zhang hong-mei1; 2 (1.college of computer and information; hefei university of technology; hefei 230009; china; 2.anhui electron and information profes-sional technology college; bengbu 233000; china)
..............page:418-419
Study on Automatic Scoring of Office Operation Questions in Exam System
wang xiu-li; ge ping-ju (college of information science and engineering; shandong agricultural university; taian 271018; china)
..............page:406-408
The Commonly Used in Sort Algorithm's Analysis and Compares
bai hong-yi (ningxia traffic school; ningxia 750001; china)
..............page:382-385
SRMS Algorithm for Software Reliability Model Selection
ding xiao-guang; zhang gui-yong (college of optoelectronic engineering; nanjing university of posts & telecommunications; nanjing 210003; china)
..............page:374-376
The Design and Application of Dynamic Tracing Based on Solaris
chen lu-yang; jin wei-zu (school of software engineering; tongji university; shanghai 201804; china)
..............page:372-373
Network Attack Type
zeng ling-zheng (data processing center; guangzhou statistics bureau; guangzhou 510030; china)
..............page:363-365
Discussed Shallowly the Computer Restarts Automatically Reason and Processing Method
gu guo-juan (equipment administrative office; yancheng teachers university; yancheng 224002; china)
..............page:477-478,484
Research on Discovery of BBS Topic Based on LSA
wu hao1; geng huan-tong2 (1.department of computer science; anhui business college of vocational technology; wuhu 241002; china; 2.college of computer and software; nanjing university of information science & technology; nanjing 210044; china)
..............page:431-433
The Filling Algorithm of Linear Symbol Based on the Horizontal Circle Configuration
zhang ming-wang; liu rong-qi (school of mathematics and computer engineering; xihua university; chengdu 610039; china)
..............page:420-422
Modeling of Network Examination System Based on UML
wang hui (department of information technology; jingzhou institute of technology; jingzhou 434100; china)
..............page:397-399
Design and Implementatioan of the Voice Software Based on Server
yang yi1; dou wan-feng1; 2 (1.college of mathematics and computer sience; nanjing normal university; nanjing 210097; china; 2.state key laboratory of novel soft-ware technology; nangjing university; nanjing 210093; china)
..............page:370-371,417
Design and Implementation of ADE Debugging Subsystem Based on Eclipse/Web Services
zhu ping; zhu hong-ming (sast-tongji spaceflight embedded computing lab; school of software engineering; tongji university; shanghai 201804; china)
..............page:368-369,373
Research and Design of WLAN Security Detection System
jiang xue-feng (school of electronics and information engineering; shenzhen polytechnic; shenzhen 518055; china)
..............page:311-312,322
A New Solution of IP Network Qos
hou song-li1; li yuan2 (1.computer center of henan university; kaifeng 475001; china; 2.network information center of henan university; kaifeng 475001; china)
..............page:300-301,362
Server Design of Office Examination System Based on Network
cheng hua (jiangsu food science college; huai an 223003; china)
..............page:298-299,329
Embedded System Security Analysis and Countermeasure
hu bo; wang xiao-ping (college of electronics & information engineering; tongji university; shanghai 201804)
..............page:295-297
linux bao guo lv xing fang huo qiang ji shu de tan suo
deng hui yan
..............page:361-362
Wireless Local Area Network Technologies and Applications in Home Network
zhuang xiao-hua (tianjin coastal polytechnic; tianjin 300451; china)
..............page:353-355
Network Safety Problems in Library and its Solutions
zhang xiao-qiong (library; guangzhou command academy of public frontier force; guangzhou 510663; china)
..............page:356-357
Research on the Vertical Search Engine Based on Heritrix and Lucene
zheng ru-bin1; sa li1; xie ting2 (1.computer science & engineering college; jimei university; xiamen 361021; china; 2.chengyi college; jimei university; xiamen 361021; china)
..............page:350-352
The Realization Based on .Net and Application of the Module of SMS
zhang yu-dong (school of computer science & technology; xuzhou nomal uinivercity; xuzhou 221116; china)
..............page:358-360
The Project Design of Honeypot Deployment Based on Network Security
shi ze-quan (department of computer science; chongqing vocational institute engineering; chongqing 400037; china)
..............page:340-341,346
DSLAM Transmission Network Technology
mai yong-gui; niu hai-xing (ningxia guyuan power supply bureauguyuan city in ningxia; guyuan 756000; china)
..............page:338-339,365
(t,n) Threshold Signature Scheme without a Trusted Party
wu yan; geng san-jing (department of computer science and technology; henan polytechnic university; jiaozuo 454000; china)
..............page:344-346
Fuzzy Query and Data Validations Based on Regular Expression
yang cheng-ke1; 2 (1.northwest normal university; lanzhou 730070; china; 2.gansu economy school; lanzhou 730050; china)
..............page:411-412
Construct Business Software Effectively
xia yi-fan (school of software engineering; tongji university; shanghai 201804; china)
..............page:379-381
Based on the Campus Network MCS Knowledge Communities in the Initial Construction of the Arts Institutions
shi xiang-bing (xinghai conservatory of music; guangzhou 510006; china)
..............page:442-443,445
Proxy Digital Signature Scheme Based on Elliptic Curves
yuan zuo-lin; ji peng (coll. of info. sci. and eng.; nanjing univ. of tech.; nanjing; 210009; china)
..............page:449-450,487
shou ba shou jiao ni ge ren dian nao wang luo an quan she zhi
jia shao hua ; sun yong
..............page:437-438
On Experimental Teaching Reform and Practices of "Microcomputer Theory and Application"
pan li-feng1; 2 (1.faculty of education science college; hunan normal university; changsha 410081; china; 2.hunan vocational college of international economics; changsha 410205; china)
..............page:439-441
The Realization of Two Kinds of FTP Intensify Function
li qi (xuzhou economic and trade higher vocational school; xuzhou 221000; china)
..............page:330-333
Construction of Intrusion Detection System Based on the Research
li fu-chun (computer science college; central south university of forestry and technology; changsha 410004; china)
..............page:318-319
The Adjustment and Optimization of the Oracle Database Performance
zhang jun-feng (liaoning university of international business and economics; dalian 116052; china)
..............page:289-290
Research on Network Security Risk Assessment Appraisal Flow
xing zhi-jun (railway wagon transport branch co. of china shenhua energy; yulin 719316; china)
..............page:366-367
Design of Dynamic Test Tool for CORBA
pan yi (college of software engineering; southeast university; nanjing 210096; china)
..............page:293-294
Design of Taxi Management Information System Based on RBAC
li lan; zhu hong-gao (department of computer science & technology; hubei polytechnic institute; xiaogan 432000; china)
..............page:275-276,279
Open Laboratory Management System Project Design and Practice
li qin (experimental communications and information processing center; nanjing university of posts and telecommunications; nanjing 210003; china)
..............page:263-264
An Analysis to the Management and Maintenance of Computer Open Laboratory in the University
deng hong-jun (zhongnan university of economics and law modern education technology center; wuhan 430073; china)
..............page:436,441
Computer Network Curriculum Teaching Reform and Practice
zhang yue (information science and technology college; jiujiang university; jiujiang 332005; china)
..............page:447-448
Transformation from XML to other Document Format Based on XSL-FO
wang mei-juan1; shi ya-qing1; zhao gai-lian2 (1.school of science; pla university of science and technology; nanjing 211101; china; 2.college of information engineering; yangzhou polytechnic college; yangzhou 225000; china)
..............page:425-428
A Shallow Talk about the Application in the Lesson of "Computer Image Processing"
ding hui1; 2 (1.jiangsu university; zhenjiang 212013; china; 2.nanjing forest police college; nanjing 210046; china)
..............page:434-435
The Design and Implementation of Online-test System Based on J2EE
qin jing-xiang (siping vocational college; siping 136002; china)
..............page:391-393
Building of Network Management Data Model in Communicate Field
jia zong-pu; li hui-chao (school of computer science and technology; he nan polytechnic university; jiaozuo 454000; china)
..............page:272-274
A Rekey Protocol MIKEY-Rekey Based on MIKEY Specification
liu yu-jiao (center of computer; mianyang normal university; mianyang 621000; china)
..............page:320-322
Design of Intrusion Detection Systems Based on Active Knowledge Bases and Databases
zhang fang-jin (anhui communications technology institute; hefei 230051; china)
..............page:286-288
Method of Text Categorization in Personalized Retrieval
peng ye-ping; xiao da-guang (information science and engineering college; central south university; changsha 416000; china)
..............page:265-266
The Application Research of Energy Efficiency Evaluating System
ren hui; wang jian (cims research center; tongji university; shanghai 201804; china)
..............page:260-262,274
Design and Implementation of Graduate Design System Based on Struts Technology
yin zhe; he dan-dan (china institute of defense science and technology; beijing 101601; china)
..............page:283-285
The Application of Modified Matrix Shortest-Path Algorithm in Traffic Simulation System
qian wei-feng; wang jian (cims research center; tongji university; shanghai 201804; china)
..............page:257-259
Design and Realization of Virtual Digital Filter Based LabWindows/CVI
zhu xiao-tao1; hong hai-li2 (1.department of postgraduate management; the academy of equipment command & technology; beijing 101416; china; 2.department of optical and electronic equipment; the academy of equipment command & technology; beijing 101416; china)
..............page:501-502
The EMC Design of DSP-based Intelligent Control Instruments
sun hu-jun (department of computer engineering; xi an aerotechnical college; xi an 710077; china)
..............page:488-489,492
The Application of Information Technology to High Technology English Teaching
fang rong (information & engineering campus; jinhua college of profession & technology; jinhua 321000; china)
..............page:503,508
Modeling with UML to Construct Student Information Management System
wei pei-li1; wei pei-xian2 (1.engineering and science college of huaqiao university; quanzhou 362000; china; 2.computer major of quanzhou normal university; quanzhou 362000; china)
..............page:402-405,410
Application of Item Teaching Method in Higher Vocational Information Technology Teaching
yi xiao-yun (computer department of nanjing health school; nanjing 210038; china)
..............page:509-510
Design of Serial Communication between PC and FCS Experimental System Based on .NET2.0 Serial Port Resources
li lin (changzhou institute of engineering technology; changzhou 213164; china)
..............page:323-324,367
A Survey of Chip Multi-Core System Framework
liu lei (beijing jiaotong university; beijing 100044; china)
..............page:485-487
Data Exchange Model Design of E-government Extranet Based on Message-Oriented Middleware
li lei; zhang fan; sun ming-ming (department of computer science; xinyang normal university; xinyang 464000; china)
..............page:325-326,433
Slove the Problems of Network Security Based on Soft and Hard Measures
lin li-ping1; zhang li-juan2 (1.jiangxi trade and industry vocational and technical college; jangxi nanchang; communication institute; nanchang 330100; china; 2. shijiazhuang academy; hebei shijiazhuang communication institute; shijiazhuang 050035; china)
..............page:327-329
Construction and Deployment of CNGI CNP Based on Yinchuan Education MAN
wang heng; gao yu-zhuo (network administration center; ningxia university; yinchuan 750021; china)
..............page:342-343
Computer Network Security System Building on ACL
ma ting (jiangsu union technical institute; lianyungang vocational technology academy of finance & economics; lianyungang 222003; china)
..............page:336-337
QoS's Router of Mobile Secure Network
lv ya-juan1; wang shuai2; li ying3 (1.jilin medical college computer office; jilin 132013; china; 2. military economical college team 3 of mster; wuhan 430035; china; 3. jilin medical college computer office; jilin 132013; china)
..............page:334-335
Design of Police-use Trojan Horse System
jiang ming-liang1; li zhi-qing2 (1.department of computer science and engineering; zhongkai university of agriculture and engineering; guangzhou 510225; china; 2. guangzhou party institute of ccp; guangzhou 510070; china)
..............page:309-310
Charge Systematic Research Automatically in the Expressway Based on Wireless Communication Technology
zhang tie-qiang (liaoning university of international business and economics; liaoning 116052; china)
..............page:499-500
Application and Research of Queuing Theory in Network Instant Communication System
jiang xiao-yun (xiamen university of technology; xiamen 361024; china)
..............page:313-315
Dynamic Examples of the Production Site
hu zhi-jie; luo qing-fang (yellow river electric power overhaul engineering co.ltd; xining 751601; china)
..............page:307-308,310
Structures the Management Information System of Clothing Enterprise Based on Object-Oriented Modeling Technique
tian bao-jie1; zhuo bin1; zhang sai-na2 (1.94170 armies; xi an 710082; china; 2.aviation 618 research institute; xi an 710065; china)
..............page:280-282
Analysis and Research of E-commerce Security Technology
huang xiao-hua (school of computer science and engineering; changshu institute of technology; changshu 215500; china)
..............page:302-303,355
Methods on Transplantation of μC/OS-Ⅱ
xu jing-feng (base course department; nanjing institute of politics; nanjing 210003; china)
..............page:493-494
A Research into Duplication of the Distributed Database
li li-gong (tianjin railway technical and vocational college; tianjin 300240; china)
..............page:277-279
SSL Protocol Analysis and Implementation
hu xiao-ye1; li jun-yi2 (1.baoji university of arts and sciences equipment department; baoji 721007; china; 2.dept. comput. sci. & tech.; shanxi police profes-sion college; xi an 710043; china)
..............page:304-306
A Brief Analysis of Questions in Network Interaction
long chao-zhong (kunshan college of jiangsu tv university; kunshan 215300; china)
..............page:316-317
Research on Survivability of IP/MPLS over WDM Network
su yan-hong (circuit and system specialty; njupt; nanjing 210003; china)
..............page:291-292,294
Application of IEEE 802.1X Authentication In Campus Network
wei ping1; 2 (1.network center of wstc; wuxi 214028; china; 2.school of information technology southern yangtze university; wuxi 214122; china)
..............page:506-508
Suggestion and Analysis the Problem of Medium and Little Enterprise Information Build
qian zhong-wu (shanghai science and engineering university manage college; shanghai 200000; china)
..............page:267-268
ji yu asp.net ji shu gou jian wang shang kao shi ping tai
guan qin jin ; zhu zhan li
..............page:269-271
Discussion of E-government System Information Security Mechanism
zhang hong-jiao (soochow university politics and administration college; suzhou 215006; china)
..............page:511-512
The Research of Advanced RISC Machines' Application on Reduced Instruction Set Computing
xu lei (liaoning university international business and economics liaoning; dalian 116052; china)
..............page:495-496
Secondary Vocational Schools in the Development of Computer Professionals Problems and Solutions
li zhen (zhengzhou city electronic and information engineering school; zhengzhou 450007; china)
..............page:504-505
CDMA Network Planning and Optimization
liang bo-yu1; chen xu-xiang2 (1.guangdong telecom corporation limited; zhuhai branch; zhuhai 519000; china; 2.mobile communications group guangdong co. ltd; zhuhai 519000; china)
..............page:481-484
The Method of Software Engineering Orient Agent
lan tian (school of computer science and technology; soochow university; suzhou 215006; china)
..............page:456-457
The Simulation and Analysis of the OFDM Radio Frequency System Based on ADS
wang wen-bin (school of electronic; information and electrical engineering; shanghai jiaotong university; shanghai 200030; china)
..............page:464-465
Ant Colony Algorithm Applies to the Optimization of Order-picking Routing Problem
yu jie1; su zhi-zhong2; sun yan-fei1 (1.information technology department; zibo vocational college; zibo 255000; china; 2.post-graduate department; shanghai university of technology; shanghai 200093; china)
..............page:466-467
The Application of Struts Technology to EMS System Plat
yuan hong-jie (shijiazhuang post & telecommunication technical college; shijiazhuang 050021; china)
..............page:416-417
The Underlying Technique for Cross-browser Components Base on Ajax
li ze (department of library network technology; southwest forestry university; kunming 650224; china)
..............page:423-424
The Study of the ElAura Kernel Object Service System
zhang qi; cao tian-jie; chen dai (department of computer science and technology; china university of mining & technology; xuzhou 221008; china)
..............page:429-430
New U-virus Prevention Methods
zhang wei (hebei university of science and technology; shijiazhuang 050018; china)
..............page:446
Implementing Acquisition and Processing of the Speech Signal Based on VB and Matlab COM
zhao wei; xiong xiao-dong; wei yong (electronics & information college; yangtze university; jingzhou 434023; china)
..............page:468-469
The Digital TV and It's Criterion
dai jie1; hua wei-lie1; yao jing1; zhang jian1; li jun2; zheng jun-jie2 (1.xinhua press; nanjing 211105; china; 2.institute of meteorology; liberation army university of science and technology; nanjing 211101; china)
..............page:470-472
Brife Analysis of AIR Technology
guo fu-san (communication and electronic engineering college; qiqihar university; qiqihar 161006; china)
..............page:386,399
The Programming Implementation of Test Report Management Information System
liu yu-jiang (liaoning university international business and economics; dalian 116052; china)
..............page:387-388
Teaching Method on VB Program Design in Universities
yao nan-sheng (department of computer and information engineering; huainan normal university; huainan 232001; china)
..............page:444-445
The Technology Supposing of Virtual Reality Exhibition Mansion in Network
li zhi-sheng; chen yu-qing (network engineering and research center; south china university of technology; guangzhou 510641; china)
..............page:458-460
The Study on Methodology for Enhancing the Image
guan xue-mei (liaoning university of international business and economics; dalian 116052; china)
..............page:451-452
Design and Implementation of Smart Monitoring Management Information System of Miner's Lamp
jiang hua1; deng jun2 (1.institution of telecommunication; air force engineering university; xi an 710077; china; 2.xidian university; xi an 710071; china)
..............page:453-455
Recognition Algorithm of Single Numeric Character Based on BP Neural Network
pan zhi-jie; ren sai-jun; chen you-rong (information science & technology college; zhejiang shuren university; hangzhou 310015; china)
..............page:461-463
The Research on the Methods to Reduce the Risk of Software Project
wang wei (school of software engineering; tongji university; shanghai 200092; china)
..............page:377-378,385
Analysis of the Internal Category and Anonymous Category in the Java Language
wu jin-xiu (huanggang polytechnic college; huanggang 438002; china)
..............page:400-401,415
Learn Flash With the View Object
liu wan-jun (yiyang vocational and technical college; yiyang 413049; china)
..............page:473-474
The Streaming Media in P2P is Developing Quickly
xing xue-sheng; feng jing; lian zhi-kai (qinhuangdao vocational and technical college; qinhuangdao 066004; china)
..............page:475-476
Design and Realization of Expressway Traffic-Guidance System
xu cheng-qiang; li zuo-wei; ni ran (department of information engineering; shandong jiaotong university; ji nan 250023; china)
..............page:490-492
Research on the Linux Process Schedule
yu yun-xia1; 2 (1.college of computer; wuhan university; wuhan 448000; china; 2.department of computer; jingchu university of technology; jingmen 448000; china)
..............page:497-498
On System Design of the Multi-threaded Communication Based on VC++
yang hong-jun; wang jin-ying (qinhuangdao vocational and technical college; qinhuangdao 066004; china)
..............page:413-415
Industrialization and Integration of Information to the Development of Computer Application Service
he xiang; wang chen-guang (western securities co.ltd.; beijing 100081; china)
..............page:479-480